288:
draws an analogy with a relay race. Each element on the project is encouraged to move as quickly as they can: when they are running their "leg" of the project, they should be focused on completing the assigned task as quickly as possible, with minimization of distractions and multitasking. In some case studies, actual batons are reportedly hung by the desks of people when they are working on critical chain tasks so that others know not to interrupt. The goal, here, is to overcome the tendency to delay work or to do extra work when there seems to be time. The CCPM literature contrasts this with "traditional" project management that monitors task start and completion dates. CCPM encourages people to move as quickly as possible, regardless of dates.
275:. In 1999, a researcher applied simulation to assess the impact of risks associated with each component of project work breakdown structure on project duration, cost and performance. Using Monte Carlo simulation, the project manager can apply different probabilities for various risk factors that affect a project component. The probability of occurrence can vary from 0% to 100% chance of occurrence. The impact of risk is entered into the simulation model along with the probability of occurrence. The number of iterations of Monte Carlo simulation depend on the tolerance level of error and provide a density graph illustrating the overall probability of risk impact on project outcome.
301:
buffers created during the planning stage. A fever chart or similar graph can be created and posted to show the consumption of buffer as a function of project completion. If the rate of buffer consumption is low, the project is on target. If the rate of consumption is such that there is likely to be little or no buffer at the end of the project, then corrective actions or recovery plans must be developed to recover the loss. When the buffer consumption rate exceeds some critical value (roughly: the rate where all of the buffer may be expected to be consumed
264:, or other reasons, CCPM uses "buffers" to monitor project schedule and financial performance. The "extra" duration of each task on the critical chain—the difference between the "safe" durations and the 50% durations—is gathered in a buffer at the end of the project. In the same way, buffers are gathered at the end of each sequence of tasks that feed into the critical chain. The date at the end of the project buffer is given to external
318:
253:, using the aggressive durations. The longest sequence of resource-leveled tasks that lead from beginning to end of the project is then identified as the critical chain. The justification for using the 50% estimates is that half of the tasks will finish early and half will finish late, so that the variance over the course of the project should be zero.
245:
A duration is assigned to each task. Some software implementations add a second duration: one a "best guess," or 50% probability duration, and a second "safe" duration, which should have higher probability of completion (perhaps 90% or 95%, depending on the amount of risk that the organization can
300:
According to proponents, monitoring is, in some ways, the greatest advantage of the
Critical Chain method. Because individual tasks vary in duration from the 50% estimate, there is no point in trying to force every task to complete "on time;" estimates can never be perfect. Instead, we monitor the
287:
With no slack in the duration of individual tasks, resources are encouraged to focus on the task at hand to complete it and hand it off to the next person or group. The objective here is to eliminate bad multitasking. This is done by providing priority information to all resources. The literature
283:
When the plan is complete and the project is ready to start, the project network is fixed and the buffers' sizes are "locked" (i.e., their planned duration may not be altered during the project), because they are used to monitor project schedule and financial performance.
291:
Because task duration has been planned at the 50% probability duration, there is pressure on resources to complete critical chain tasks as quickly as possible, overcoming student's syndrome and
Parkinson's Law.
223:
feel that the earned value management technique is misleading, because it does not distinguish progress on the project constraint (i.e., on the critical chain) from progress on non-constraints (
529:
200:
CCPM planning aggregates the large amounts of safety time added to tasks within a project into the buffers—to protect the due-date performance and avoid wasting this safety time through
57:
algorithms, which emphasize task order and rigid scheduling. A critical chain project network strives to keep resources levelled, and requires that they be flexible in start times.
133:
from being completed in a shorter time, given finite resources. If resources are always available in unlimited quantities, then a project's critical chain is identical to its
610:
102:
With traditional project management methods, 30% of lost time and resources are typically consumed by wasteful techniques such as bad multitasking (in particular
242:(WBS) is created in much the same fashion as with critical path. The plan is worked backward from a completion date with each task starting as late as possible.
246:
accept). Other software implementations go through the duration estimate of every task and remove a fixed percentage to be aggregated into the buffers.
542:
75:. The application of CCPM has been credited with achieving projects 10% to 50% faster and/or cheaper than the traditional methods (i.e., CPM, PERT,
94:(technical content delivered), and 30% are cancelled before completion. CCPM tries to improve performance relative to these traditional statistics.
676:
524:
681:
596:
163:
As far as is known, there is no analytical method for finding an absolute optimum (i.e., having the overall shortest critical chain).
505:
492:
192:
Monitoring project progress and health by monitoring the consumption rate of the buffers rather than individual task performance to
154:. Implicit means that they are not included in the project network, but must be identified by looking at the resource requirements.
167:
150:
686:
603:
193:
87:
38:
103:
407:
91:
619:
86:
and others as of 1998, only 44% of projects typically finish on time. Projects typically complete at 222% of the
42:
466:
239:
268:
as the delivery date. Finally, a baseline is established, which enables financial monitoring of the project.
362:
305:
the end of the project, resulting in late completion), then those alternative plans need to be implemented.
226:
216:
552:
539:
272:
141:
70:
20:
582:
357:
66:
655:
630:
271:
An alternate duration-estimation methodology uses probability-based quantification of duration using
265:
134:
50:
90:
originally planned, 189% of the original budgeted cost, 70% of projects fall short of their planned
170:
is much greater than the difference between the optimum and near-optimum ("good enough" solutions).
46:
650:
201:
34:
383:
257:
209:
111:
571:
517:
Critical Chain in
Practice: Using the Theory of Constraints to Manage Projects & Portfolios
431:
645:
635:
520:
501:
488:
250:
261:
205:
107:
565:
546:
220:
83:
317:
670:
118:
65:
Critical chain project management is based on methods and algorithms derived from
475:
Tzvi Raz, Robert Barnes and Dov Dvir, Project
Management Journal, December 2003.
126:
76:
256:
Recognizing that tasks are more likely to take more time than less time due to
588:
467:
https://www.melbourne.pmi.org.au/wp-content/files/MWP1020_Critical_Chain.pdf
576:
69:. The idea of CCPM was introduced in 1997 in Eliyahu M. Goldratt's book,
187:
Resource buffers (companies are usually reluctant to give more resources)
144:. Main features that distinguish critical chain from critical path are:
384:"The Basics of Critical Chain Project Management [2024] • Asana"
568:- Description of Project Buffering and Critical Chain Buffer Management
130:
229:
can determine the size of the project, feeding, and resource buffers.
215:
Critical chain project management uses buffer management instead of
82:
According to studies of traditional project management methods by
408:"Critical Chain Project Management Improves Project Performance"
54:
41:(people, equipment, physical space) required to execute project
592:
312:
49:. It differs from more traditional methods that derive from
348:
Critical sequence was originally identified in the 1960s.
553:
A critical review of "A Critical Look at
Critical Chain"
329:
549:, Roy Stratton, POMS 20th Annual Conference, May 2009
540:
Critical Chain
Project Management Theory and Practice
249:
Resources are assigned to each task, and the plan is
530:
A critical look at critical chain project management
19:"Critical Chain" redirects here. For the novel, see
511:
Projects in Less Time: A Synopsis of
Critical Chain
555:, Scott Button, EM 540 Research Paper, March 2011
129:- and resource-dependent tasks that prevents a
604:
219:to assess the performance of a project. Some
160:—a "good enough" solution is enough because:
114:, in-box delays, and lack of prioritization.
8:
611:
597:
589:
572:Theory of Constraints: A Research Database
566:An Online Guide To Theory Of Constraints
532:, Tzvi Raz, Robert Barnes and Dov Dvir,
16:Method of planning and managing projects
374:
212:, and poorly synchronized integration.
176:Identification and insertion of buffers
585:- A 10 question quiz on Critical Chain
158:Lack of search for an optimum solution
79:, etc.) developed from 1910 to 1950s.
579:- Website dedicated to Critical Chain
7:
140:Critical chain is an alternative to
485:Project Management In the Fast Lane
14:
641:Critical chain project management
519:, by J.P.Bernard & I.Icord,
498:Critical Chain Project Management
457:Harvey Maylor, Project Management
432:"The Standish Group Report Chaos"
149:Use of (often implicit) resource
27:Critical chain project management
316:
33:) is a method of planning and
1:
677:Project management techniques
166:The inherent uncertainty in
703:
682:Project management by type
534:Project Management Journal
18:
626:
620:Schedule network analysis
240:work breakdown structure
125:is the sequence of both
577:Critical Chain projects
363:Event chain methodology
227:Event chain methodology
225:i.e., on other paths).
217:earned value management
45:. It was developed by
439:www.projectsmart.co.uk
273:Monte Carlo simulation
142:critical path analysis
21:Critical Chain (novel)
687:Theory of constraints
358:Theory of Constraints
67:Theory of Constraints
656:Schedule compression
631:Critical path method
135:critical path method
37:that emphasizes the
47:Eliyahu M. Goldratt
651:Resource smoothing
545:2018-08-17 at the
328:. You can help by
238:A project plan or
664:
663:
646:Resource leveling
636:Scenario analysis
525:978-2-35422-253-6
513:, by Mark Woeppel
346:
345:
35:managing projects
694:
613:
606:
599:
590:
536:, December 2003.
469:
464:
458:
455:
449:
448:
446:
445:
436:
428:
422:
421:
419:
418:
404:
398:
397:
395:
394:
379:
341:
338:
320:
313:
262:Student syndrome
251:resource leveled
221:project managers
206:student syndrome
202:bad multitasking
108:student syndrome
702:
701:
697:
696:
695:
693:
692:
691:
667:
666:
665:
660:
622:
617:
562:
547:Wayback Machine
481:
479:Further reading
473:
472:
465:
461:
456:
452:
443:
441:
434:
430:
429:
425:
416:
414:
406:
405:
401:
392:
390:
381:
380:
376:
371:
354:
342:
336:
333:
326:needs expansion
311:
298:
281:
258:Parkinson's law
236:
210:Parkinson's Law
184:Feeding buffers
112:Parkinson's law
100:
63:
24:
17:
12:
11:
5:
700:
698:
690:
689:
684:
679:
669:
668:
662:
661:
659:
658:
653:
648:
643:
638:
633:
627:
624:
623:
618:
616:
615:
608:
601:
593:
587:
586:
580:
574:
569:
561:
560:External links
558:
557:
556:
550:
537:
527:
514:
508:
495:
480:
477:
471:
470:
459:
450:
423:
399:
373:
372:
370:
367:
366:
365:
360:
353:
350:
344:
343:
323:
321:
310:
307:
297:
294:
280:
277:
235:
232:
198:
197:
190:
189:
188:
185:
182:
181:Project buffer
173:
172:
171:
164:
155:
123:critical chain
104:task switching
99:
96:
84:Standish Group
72:Critical Chain
62:
59:
15:
13:
10:
9:
6:
4:
3:
2:
699:
688:
685:
683:
680:
678:
675:
674:
672:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
628:
625:
621:
614:
609:
607:
602:
600:
595:
594:
591:
584:
581:
578:
575:
573:
570:
567:
564:
563:
559:
554:
551:
548:
544:
541:
538:
535:
531:
528:
526:
522:
518:
515:
512:
509:
507:
506:1-58053-074-5
503:
499:
496:
494:
493:1-57444-195-7
490:
486:
483:
482:
478:
476:
468:
463:
460:
454:
451:
440:
433:
427:
424:
413:
409:
403:
400:
389:
385:
378:
375:
368:
364:
361:
359:
356:
355:
351:
349:
340:
331:
327:
324:This section
322:
319:
315:
314:
308:
306:
304:
295:
293:
289:
285:
278:
276:
274:
269:
267:
263:
259:
254:
252:
247:
243:
241:
233:
231:
230:
228:
222:
218:
213:
211:
207:
203:
195:
191:
186:
183:
180:
179:
177:
174:
169:
165:
162:
161:
159:
156:
153:
152:
147:
146:
145:
143:
138:
136:
132:
128:
124:
120:
115:
113:
109:
105:
97:
95:
93:
89:
85:
80:
78:
74:
73:
68:
60:
58:
56:
52:
51:critical path
48:
44:
40:
36:
32:
28:
22:
640:
533:
516:
510:
497:
484:
474:
462:
453:
442:. Retrieved
438:
426:
415:. Retrieved
411:
402:
391:. Retrieved
387:
377:
347:
334:
330:adding to it
325:
302:
299:
290:
286:
282:
270:
266:stakeholders
255:
248:
244:
237:
224:
214:
199:
175:
157:
151:dependencies
148:
139:
122:
119:project plan
116:
101:
81:
71:
64:
30:
26:
25:
412:www.pmi.org
671:Categories
444:2017-07-20
417:2017-01-27
393:2024-07-18
369:References
337:April 2010
296:Monitoring
127:precedence
279:Execution
168:estimates
39:resources
543:Archived
352:See also
234:Planning
194:schedule
88:duration
382:Asana.
309:History
131:project
98:Details
61:Origins
523:
504:
491:
303:before
121:, the
435:(PDF)
388:Asana
117:In a
92:scope
77:Gantt
43:tasks
583:Quiz
521:ISBN
502:ISBN
489:ISBN
55:PERT
53:and
31:CCPM
332:.
106:),
673::
500:,
487:,
437:.
410:.
386:.
260:,
208:,
204:,
178::
137:.
110:,
612:e
605:t
598:v
447:.
420:.
396:.
339:)
335:(
196:.
29:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.